Skip to main content

CVE-2025-10391: Server-Side Request Forgery in CRMEB

Medium
VulnerabilityCVE-2025-10391cvecve-2025-10391
Published: Sun Sep 14 2025 (09/14/2025, 05:02:06 UTC)
Source: CVE Database V5
Product: CRMEB

Description

A security vulnerability has been detected in CRMEB up to 5.6.1. The impacted element is the function testOutUrl of the file app/services/out/OutAccountServices.php. The manipulation of the argument push_token_url leads to server-side request forgery. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/14/2025, 05:08:10 UTC

Technical Analysis

CVE-2025-10391 is a Server-Side Request Forgery (SSRF) vulnerability identified in CRMEB versions up to 5.6.1, specifically within the function testOutUrl located in the file app/services/out/OutAccountServices.php. The vulnerability arises due to improper validation or sanitization of the push_token_url argument, which an attacker can manipulate to cause the server to make unintended HTTP requests. SSRF vulnerabilities allow attackers to coerce the vulnerable server into sending requests to arbitrary internal or external resources, potentially bypassing network access controls. This can lead to information disclosure, internal network reconnaissance, or interaction with otherwise inaccessible services. The vulnerability can be exploited remotely without authentication or user interaction, increasing its risk profile. Although the vendor was notified early, no response or patch has been provided, and the exploit details have been publicly disclosed, raising the likelihood of exploitation attempts. The CVSS v4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. However, the lack of vendor response and public exploit disclosure heighten the urgency for mitigation. CRMEB is a customer relationship management and e-commerce backend platform, often deployed by businesses to manage customer data and sales processes. The SSRF vulnerability could allow attackers to access internal services, potentially leading to further compromise or data leakage within affected environments.

Potential Impact

For European organizations using CRMEB versions 5.6.0 or 5.6.1, this SSRF vulnerability poses a moderate risk. Exploitation could allow attackers to perform internal network reconnaissance, access sensitive internal endpoints, or interact with cloud metadata services if hosted in cloud environments, potentially leading to credential theft or lateral movement. This is particularly concerning for organizations handling sensitive customer data or financial transactions. The vulnerability could also be leveraged as a pivot point for more advanced attacks, especially in complex network architectures common in European enterprises. Given the public disclosure and absence of vendor patches, attackers may develop automated tools to exploit this flaw, increasing the risk of widespread attacks. The impact on confidentiality, integrity, and availability is limited but non-negligible, especially if combined with other vulnerabilities or misconfigurations. Organizations in regulated sectors such as finance, healthcare, and government may face compliance risks if this vulnerability leads to data breaches.

Mitigation Recommendations

European organizations should immediately audit their CRMEB installations to identify affected versions (5.6.0 and 5.6.1). In the absence of an official patch, organizations should implement the following mitigations: 1) Apply strict input validation and sanitization on the push_token_url parameter at the application or web server level to block malicious URLs or restrict requests to trusted domains only. 2) Employ network-level controls such as firewall rules or egress filtering to prevent the CRMEB server from making arbitrary outbound HTTP requests, especially to internal or sensitive IP ranges. 3) Monitor outbound traffic from CRMEB servers for unusual or unexpected requests indicative of SSRF exploitation attempts. 4) Isolate CRMEB servers in segmented network zones with minimal access to internal resources to limit potential SSRF impact. 5) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting the push_token_url parameter. 6) Maintain vigilant logging and alerting on CRMEB server activity to detect exploitation attempts early. 7) Engage with CRMEB vendor or community for updates or unofficial patches and plan for prompt application once available. These targeted mitigations go beyond generic advice by focusing on controlling the specific vulnerable parameter and limiting the server's ability to perform unauthorized requests.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T09:45:58.759Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c64da614e9827585ce5f7f

Added to database: 9/14/2025, 5:07:50 AM

Last enriched: 9/14/2025, 5:08:10 AM

Last updated: 9/14/2025, 7:06:30 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats